Sciweavers

8770 search results - page 1338 / 1754
» Named Service Networking
Sort
View
IJNSEC
2008
152views more  IJNSEC 2008»
15 years 4 months ago
Group Key Management in MANETs
Specific applications like military or public emergency ones require secure group communication in ad hoc environments. The most suitable solution to provide the expected level of...
Mohamed Salah Bouassida, Isabelle Chrisment, Olivi...
145
Voted
JNW
2007
88views more  JNW 2007»
15 years 4 months ago
Integrated Proactive Admission Control Technique For both UDP And TCP Traffic Flows
—Real time traffic adopting UDP at the transport layer needs some quality of service. It is offered through an admission control scheme. This paper adopts one such scheme which i...
Lakshmanan Senthilkumar, Venkadachalam Sankaranara...
PE
2000
Springer
175views Optimization» more  PE 2000»
15 years 4 months ago
Credit-based source-adaptive multilayered video multicast
Spatial and temporal variations in network bandwidth constraints constitute serious challenges to the multicast distribution of real-time video content. This paper presents a vide...
Célio Albuquerque, Brett J. Vickers, Tatsuy...
152
Voted
CCR
1999
149views more  CCR 1999»
15 years 4 months ago
A survey of web caching schemes for the Internet
The World Wide Web can be considered as a large distributed information system that provides access to shared data objects. As one of the most popular applications currently runni...
Jia Wang
ICWE
2010
Springer
15 years 3 months ago
Mashing Up Your Web-Enabled Home
Many efforts are currently going towards networking smart things from the physical world (e.g. RFID, wireless sensor and actuator networks, embedded devices) on a larger scale. Rat...
Dominique Guinard
« Prev « First page 1338 / 1754 Last » Next »